  {"id":70,"date":"2020-07-10T13:31:49","date_gmt":"2020-07-10T17:31:49","guid":{"rendered":"https:\/\/www.adelphi.edu\/it\/security\/secure-communication\/"},"modified":"2020-08-04T09:29:48","modified_gmt":"2020-08-04T13:29:48","slug":"communication","status":"publish","type":"page","link":"https:\/\/www.adelphi.edu\/it\/security\/communication\/","title":{"rendered":"Secure Communication"},"content":{"rendered":"<h2>When Shopping Online or Entering Confidential Data<\/h2>\n<ul>\n<li><strong>HTTP vs. HTTPS:<\/strong> Look for &#8220;https&#8221; in the browser address bar and the security lock icon in the bottom right corner.<\/li>\n<li><strong>VeriSign:<\/strong> Make sure that the website you are entering your information on protected by VeriSign.<\/li>\n<li><strong>Identity theft Prevention:<\/strong>\n<ul>\n<li>SSL \u2013 Secure Socket Layer<\/li>\n<li>WEP \u2013 Wireless Encryption Protocol<\/li>\n<li>SSH \u2013 Secure Shell<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Email Security<\/h2>\n<ul>\n<li>Do not automatically display or run scripts.<\/li>\n<li>Do not download files unless you know what they contain.<\/li>\n<li>If possible, avoid HTML based email;\u00a0only click to display the HTML format if you trust the sender.<\/li>\n<li>Viruses can forge email addresses.<\/li>\n<li>Adelphi&#8217;s Office of Information Technology deters approximately 150,000 email threats per day (about 80%-90% of the daily messages that come through our servers).<\/li>\n<\/ul>\n<h2>Browser Settings<\/h2>\n<ul>\n<li>Adelphi IT recommends <a href=\"http:\/\/www.mozilla.org\/en-US\/firefox\/new\/\" target=\"_blank\" rel=\"noopener noreferrer\">Firefox<\/a> and <a href=\"https:\/\/www.google.com\/intl\/en\/chrome\/browser\/\" target=\"_blank\" rel=\"noopener noreferrer\">Chrome<\/a>\u00a0browsers. Ensure that your browser is up to date with the latest version and regularly apply security patches.<\/li>\n<li>&#8220;Trusted Sites&#8221; setting should be kept to a minimum<\/li>\n<li>&#8220;Active X&#8221; Controls are often not necessary<\/li>\n<\/ul>\n<h2>Wireless Connections<\/h2>\n<ul>\n<li>Always use Encryption.<\/li>\n<li>Hot Spots: Do not use financial or sensitive information or send passwords across public wi-fi hot spots.<\/li>\n<li>Go to <a href=\"https:\/\/www.adelphi.edu\/it-services\/wireless\/\">wireless connectivity instructions<\/a> for Adelphi.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>When Shopping Online or Entering Confidential Data HTTP vs. HTTPS: Look for &#8220;https&#8221; in the browser address bar and the security lock icon in the bottom right corner. VeriSign: Make sure that the website you are entering your information on protected by VeriSign. Identity theft Prevention: SSL \u2013 Secure Socket Layer WEP \u2013 Wireless Encryption&hellip;<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":27,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-70","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<title>Keep Your Identity Safe | 91勛圖厙<\/title>\n<meta name=\"description\" content=\"Adelphi&#039;s Information Technology&#039;s tips for keep your identity safe online. Online shopping, email security, browser settings, windows updates and wireless connections all covered.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adelphi.edu\/it\/security\/communication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keep Your Identity Safe | 91勛圖厙\" \/>\n<meta property=\"og:description\" content=\"Adelphi&#039;s Information Technology&#039;s tips for keep your identity safe online. Online shopping, email security, browser settings, windows updates and wireless connections all covered.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adelphi.edu\/it\/security\/communication\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-04T13:29:48+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>","yoast_head_json":{"title":"Keep Your Identity Safe | 91勛圖厙","description":"Adelphi's Information Technology's tips for keep your identity safe online. Online shopping, email security, browser settings, windows updates and wireless connections all covered.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adelphi.edu\/it\/security\/communication\/","og_locale":"en_US","og_type":"article","og_title":"Keep Your Identity Safe | 91勛圖厙","og_description":"Adelphi's Information Technology's tips for keep your identity safe online. Online shopping, email security, browser settings, windows updates and wireless connections all covered.","og_url":"https:\/\/www.adelphi.edu\/it\/security\/communication\/","og_site_name":"Information Technology","article_modified_time":"2020-08-04T13:29:48+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.adelphi.edu\/it\/security\/communication\/","url":"https:\/\/www.adelphi.edu\/it\/security\/communication\/","name":"Keep Your Identity Safe | 91勛圖厙","isPartOf":{"@id":"https:\/\/www.adelphi.edu\/it\/#website"},"datePublished":"2020-07-10T17:31:49+00:00","dateModified":"2020-08-04T13:29:48+00:00","description":"Adelphi's Information Technology's tips for keep your identity safe online. Online shopping, email security, browser settings, windows updates and wireless connections all covered.","breadcrumb":{"@id":"https:\/\/www.adelphi.edu\/it\/security\/communication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adelphi.edu\/it\/security\/communication\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.adelphi.edu\/it\/security\/communication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adelphi.edu\/it\/"},{"@type":"ListItem","position":2,"name":"Information Security","item":"https:\/\/www.adelphi.edu\/it\/security\/"},{"@type":"ListItem","position":3,"name":"Secure Communication"}]},{"@type":"WebSite","@id":"https:\/\/www.adelphi.edu\/it\/#website","url":"https:\/\/www.adelphi.edu\/it\/","name":"Information Technology","description":"Just another Adelphi Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adelphi.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"new_scheduled_revision":"","save_as_revision":"","_links":{"self":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/70"}],"collection":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/comments?post=70"}],"version-history":[{"count":3,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/70\/revisions"}],"predecessor-version":[{"id":227,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/70\/revisions\/227"}],"up":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/27"}],"wp:attachment":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/media?parent=70"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}